top 5 features of application visibilty and control

11
Application Visibility and Control Top 5 Features & Benefits

Upload: anthony-daniel

Post on 13-Jul-2015

83 views

Category:

Internet


0 download

TRANSCRIPT

Application Visibility and Control

Top 5 Features & Benefits

Application Visibility and Control??

Application visibility and control offers total visibility and contol over, which application by which user is being accesed within the organization, irrespective of their ports and protocols.

It is the best way to avoid application-layer threats, including malware, phishing, botnets etc.

Cyberoam with layer 7 and layer 8 identity-based policies and reporting offers application visibility and control over 2000+ key applications.

Top 5 Features of Cyberoam's Application Visibility and Control

1) Application Security

2) Granular Controls

3) User and Time-based Controls for Application Access

4) Layer 8 Identity and QoS-based Application Control

5) QoS for Applications

*QoS= Quality of Service

1) Application Security

Features It restricts and blocks anonymous proxies

Prevents “phone home” activities and keyloggers

Layer 7 and Layer 8 visibility

Database available with inbuilt application category Benefits: Prevents sophisticated application-based threats including malware,

phishing, botnets

2) Granular Controls

Features: Pro-active protection model

Applications are categorized based on their level of risk, characteristics and technology

Benefits: Policies can be set or edited easily for application access with just few

clicks

No manual updates needed for new application in network

3) User and Time-based Controls for Application Access

Features: Controls usage of social applications and networking sites, such as:

Facebook, YouTube etc.

Controls P2P (peer-to-peer) applications, such as: Skype

Bifurcates creation of White (Business-critical), Grey (social, entertainment) and Black (non-productive) application categories based on priority

Schedules non-critical applications during non-peak hours.

3) User and Time-based Controls for

Application Access

Benefits: Controlled bandwidth usage

Enhanced productivity through flexibility

Supports business-critical applications

Ensures application security

4) Layer 8 Identity and QoS-based Application Control

Features: Controls usage of application depending upon user, user group,

bandwidth, sources and destination.

Benefits: Enhanced productivity

Optimizes usage of bandwidth

Supports user-critical applications, such as VoIP

5) QoS for Applications

Features: Limits bandwidth allocation to non-business applications

Priority-based bandwidth allocation to critical applications

Benefits: Optimized bandwidth utilization

Enables application QoS

*QoS= Quality of Service

Our Social Reach

Cyberoam Technologies

USA Central : +1-732-412-4896Delhi & NCR : +91-9899150300Ahmedabad : +91-9925011328Bangalore: +91-9880345671 Dubai: +971-4-214 9860

Cyberoam House,Saigulshan Complex,

Opp. Sanskruti,Beside White House,

Panchwati Cross Road,Ahmedabad - 380006,

GUJARAT, INDIA.

Cyberoam TechnologiesCyberoam TechnologiesCyberoam TechnologiesCyberoam TechnologiesCyberoam Technologies

North America505 Thornall

Street, Suite # 304Edison, NJ -08837

USA

[email protected]